WO2006122700A2 - Procede de desactivation d'un dispositif mobile - Google Patents

Procede de desactivation d'un dispositif mobile Download PDF

Info

Publication number
WO2006122700A2
WO2006122700A2 PCT/EP2006/004428 EP2006004428W WO2006122700A2 WO 2006122700 A2 WO2006122700 A2 WO 2006122700A2 EP 2006004428 W EP2006004428 W EP 2006004428W WO 2006122700 A2 WO2006122700 A2 WO 2006122700A2
Authority
WO
WIPO (PCT)
Prior art keywords
functionality
program instructions
disabling
mobile device
data
Prior art date
Application number
PCT/EP2006/004428
Other languages
English (en)
Other versions
WO2006122700A3 (fr
Inventor
Tom Gajdos
Martin Kretz
Original Assignee
Sony Ericsson Mobile Communications Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sony Ericsson Mobile Communications Ab filed Critical Sony Ericsson Mobile Communications Ab
Priority to CN2006800260498A priority Critical patent/CN101223799B/zh
Priority to US11/914,157 priority patent/US20080293397A1/en
Priority to MX2007014276A priority patent/MX2007014276A/es
Priority to BRPI0610417-7A priority patent/BRPI0610417A2/pt
Priority to JP2008511593A priority patent/JP4838303B2/ja
Publication of WO2006122700A2 publication Critical patent/WO2006122700A2/fr
Publication of WO2006122700A3 publication Critical patent/WO2006122700A3/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • the present invention relates to a method for remotely disabling at least one functionality of a mobile device.
  • the invention also relates to a mobile device having communication capabilities and comprising at least one functionality, which may be disabled from a remote location.
  • the communication network may e.g. be a mobile communication network, such as a GSM (Global System for Mobile communication) network, or a WCDMA (Wideband Code Division Multiple Access) network as specified e.g. by 3GPP (3 rd Generation Partnership Project) .
  • GSM Global System for Mobile communication
  • WCDMA Wideband Code Division Multiple Access
  • GB-A-2 380 356 discloses remote disabling or locking of a mobile communication apparatus having a subscriber identity module (SIM) .
  • SIM subscriber identity module
  • a flag within a memory of the SIM is set.
  • access to functionality of the mobile telephone is prevented.
  • the mobile telephone may still be used if the disabled SIM is replaced by another SIM.
  • functionality provided without involvement of the SIM and content stored in a memory external to the SIM may be accessible even if the SIM is made useless.
  • the mobile telephone is still of value to the thief.
  • no acknowledgement of disabling of the mobile telephone may be provided to the control center.
  • a method for disabling at least one functionality of a mobile device having communication capabilities and program instructions for said functionality comprises receiving a message from a remote communication device by means of the mobile device.
  • the message includes disabling data for disabling the at least one functionality.
  • the method also comprises altering at least a portion of the program instructions for the at least one functionality based on the disabling data and thereby disabling the functionality.
  • the disabling data includes data for altering the program instructions for the at least one functionality.
  • the method may also comprise receiving the message according to a protocol for updating program instructions.
  • the disabling data may be associated with at least a portion of the program instructions for the at least one functionality. Also, the method may comprise updating the portion with the disabling data.
  • the disabling data may comprise delete instructions for deleting at least a portion of the program instructions. The method may comprise deleting the portion in response to executing the delete instructions.
  • the disabling data may include program instructions for a functionality.
  • the step of altering may comprise replacing at least a portion of the program instructions with the program instructions included in the disabling data .
  • the program instructions of the disabling data may be instructions for a tracking functionality.
  • the method may comprise generating a geographical position of the mobile device and transmitting the geographical position to a remote device in response to running the program instructions for the tracking functionality.
  • the disabling data may comprise an identity tag.
  • the method may comprise storing the identity tag in a memory.
  • the identity tag may be read in response to an attempt to restore a previously disabled functionality.
  • a mobile device comprises a memory having program instructions for at least one functionality, a receiver for receiving a message from a remote communication device, and an updating unit for updating at least a portion of the program instructions based on the disabling data and thereby disabling said functionality.
  • the message comprises disabling data for disabling the at least one functionality.
  • the disabling data comprises data for altering the program instructions.
  • the receiver may comprise means for receiving, during operation, the message according to a protocol for updating program instructions.
  • the disabling data may be associated with at least a portion of the program instructions for the at least one functionality.
  • the disabling data may include instructions to delete at least a portion of the stored program instructions.
  • the disabling data may include program instructions for a functionality. If so, the updating unit may be configured to replace at least a portion of the program instructions for the at least one functionality with the program instructions of the disabling data.
  • the program instructions of the disabling data may be program instructions for a tracking functionality.
  • the mobile device may comprise a position determination unit for determining the geographical position of the mobile device .
  • the disabling data may include an identity tag. If so, the mobile device may comprise a processor for reading the identity tag in response to an attempt to restore a disabled functionality.
  • the mobile device may be a portable mobile radio communication equipment, a mobile radio terminal, a mobile telephone, a pager, a communicator, an electronic organizer, a smartphone, a vehicle, a rail vehicle, an aircraft or a boat.
  • a method for remotely disabling at least one functionality of a mobile device having communication capabilities and program instructions for said functionality comprises generating a message comprising disabling data for disabling at least one functionality of the mobile device; and transmitting the message to the mobile device from a control center.
  • the disabling data comprises data for disabling at least a portion of the program instructions.
  • the method for remotely disabling at least one functionality may comprise transmitting the message according to a protocol for updating program instructions.
  • the method for remotely disabling at least one functionality may comprise incorporating disabling data including program instructions for deleting at least a portion of the program instructions into the message. Also, said method may comprise incorporating the disabling data including data for replacing at least a portion of the program instructions for said at least one functionality into the message.
  • the disabling data may include program instructions to replace at least a portion of the program instructions for said at least one functionality.
  • the disabling data may include program instructions for a tracking functionality.
  • a control device for remotely disabling at least one functionality of a mobile device having communication capabilities and program instructions for said functionality comprises a controller for generating a message including disabling data for disabling at least one functionality of the mobile device; and a communication unit for transmitting the message to the mobile device.
  • the disabling data includes data for disabling at least a portion of the program instructions; and the controller comprises means for, during operation, incorporating the disabling data into the message.
  • the communication unit may be configured to transmit the message according to a protocol for updating program instructions.
  • the disabling data may include program instructions for deleting at least a portion of the program instructions for said at least one functionality.
  • the disabling data may include data for replacing at least a portion of the program instructions for the at least one functionality.
  • the disabling data may include program instructions to replace at least a portion of the program instructions for said at least one functionality.
  • the disabling data may include program instructions for a tracking functionality.
  • a computer program product comprises computer program code means for executing the method for disabling at least one functionality of a mobile device, when the computer program code means are run by an electronic device having computer capabilities.
  • a computer program product comprises computer program code means for executing the method for remotely disabling at least one functionality, when said computer program code means are run by an electronic device having computer capabilities.
  • Fig. 1 is a schematic view of a mobile device connected to a control center via a communication network
  • Fig. 2 is a block diagram of components of the mobile device in Fig. 1 ;
  • Fig. 3 is a block diagram of components of the control center of Fig. 1;
  • Fig. 4 is a flow-chart of one embodiment of the method according to the invention.
  • Fig. 1 illustrates a mobile device 1 having communication capabilities, such as speech, data, and message communication capabilities, which may be connected to a communication network 10 over a wireless link 11.
  • the communication network 10 is connected to a control center 20, from which a message, which is relayed by the communication network 10, may be transmitted to the mobile device 1. If the mobile device 1 has been stolen, a message comprising disabling data for altering stored program instructions for at least one functionality of the mobile device 1 may be transmitted from the control center 20 to the mobile device 1 for remotely disabling at least one of its functionalities.
  • the control center 20 may be connected to a global information network 30, such as the Internet, and/or a PSTN (Public Switched Telephone Network) 40, such that reporting of the mobile device 1 being stolen may be provided by means of a computer connected to the Internet 30 and/or by means of a telephone connected to the PSTN 40. Reporting of the mobile device 1 being stolen may also be made by means of a wireless communication device, such as a mobile telephone, being connected to the communication network 10.
  • the mobile device 1 may be a portable mobile radio communication equipment, a mobile radio terminal, a mobile telephone, a pager, a communicator, an electronic organizer, and a smartphone .
  • the mobile device may also be a vehicle, a rail vehicle, an aircraft or a boat, which has communication capabilities, e.g. built-in radio communication equipment. In Fig. 1, the mobile device is exemplified as a mobile telephone.
  • the mobile device 1 comprises a receiver/transmitter unit 100, a processor 110, such as a CPU (Central Processing unit) , an updating unit 120, a memory 130, a position determination unit 140 and an input/output interface 150.
  • the receiver/transmitter unit 100 may be a radio receiver/transmitter, which utilizes a TDMA (Time Division Multiple Access) access technique e.g. according to the GSM (Global System for Mobile communication) standard, a CDMA (Code Division Multiple Access) , or a WCDMA (Wideband CDMA) , such as according to the 3GPP (3 rd Generation Partnership Project) standard.
  • TDMA Time Division Multiple Access
  • GSM Global System for Mobile communication
  • CDMA Code Division Multiple Access
  • WCDMA Wideband CDMA
  • the mobile device 1 may comprise various types of memories, such as a RAM (Random Access Memory), and a nonvolatile memory, such as a ROM (Read Only Memory) or a SIM (Subscriber Identity Module) , shown collectively by memory 130.
  • the program data such as firmware software, relating to the functionality of the mobile device may be stored in the ROM and/or the SIM.
  • the updating unit 120 may be implemented by means of a separate hardware component, such as a processor, an ASIC (Application Specific Integrated Circuit) or an FPGA (Field programmable Gate Array) .
  • the updating unit 120 is implemented as a software component, i.e. software program code means, which may be run by processor 110 or a separate processor.
  • the program code means may e.g. be stored in memory 130.
  • the updating unit 120 may also be implemented as a combination of a software and hardware component .
  • the position determination unit 140 may comprise a GPS (Global Positioning System) unit for determining the geographical position of the mobile device 1.
  • the position determination unit 140 is adapted to obtain the geographical position based on data received from the communication network 10, such as time of arrival, angle of arrival and/or time difference of arrival for signals received from one or several base stations.
  • Some networks also provide network assisted GPS, to which the position determination unit 140 may be configured.
  • the input/output interface 150 comprises connecting means for connecting the mobile device to an external electronic device, such as a computer.
  • the connecting means may e.g. be an accessory connector, through which the mobile device 1 may be connected to the external electronic device by means of a cable.
  • the connecting means comprises means for a wireless connection, such as an infrared transmitter/receiver, or a short link radio transmitter/receiver, such as a Bluetooth radio.
  • a message transmitted by the control center 20 is received by means of the receiver/transmitter unit 100, and processed by means of the processor 110. If the message is an updating message for altering at least a portion of program instructions for a functionality of the mobile device 1 the processor 110 will forward the message, or the disabling data thereof, to the updating unit 120.
  • the updating unit 120 is configured to process the disabling.
  • the disabling data is received in a message from the control center 20.
  • a functionality of the mobile device 1 may be provided by program instructions or code means stored in the memory 130 and being executable by one or several processors. The functionality of the mobile device 1 may e.g.
  • the functionality is a functionality of a vehicle, such as an electronic fuel injection system, an ignition system, or a drive by wire system, such as an electronic steering or an electronic accelerator pedal of the car.
  • the functionality of the mobile device 1 may be any kind of functionality, which is supported or implemented by program instructions to function properly.
  • At least one functionality of the mobile device is disabled if the updating unit 120 alters data bits of at least a portion of program instructions for the at least one functionality based on the disabling data.
  • the updating unit 120 may alter certain portions of the program instructions relating to the functionality with data bits of the disabling data, which e.g. may be a set of only zeros or only ones, or a combination thereof that does not provide anything useful, thereby disabling the functionality.
  • the disabling data comprises program instructions for instruction the updating unit 120 to delete certain portions of the stored data bits of the program instructions relating to the functionality, thereby disabling it.
  • Disabling the mobile device 1 has the advantage that an unauthorized user has no or at least limited use of the mobile device 1. Also, if all functionalities, which may incur costs to the owner of the mobile device 1, are disabled said costs may be avoided.
  • the disabling data comprises program instructions or software program code means for a functionality that is new for the mobile device 1.
  • the updating unit 120 replaces at least a portion of stored program instructions for at least one functionality with program instructions of the disabling data.
  • the disabling data may e.g. comprise program instructions for a tracking functionality.
  • Adding a functionality has the advantage that not only is a functionality disabled, another functionality is added, which may aid in getting the stolen mobile device 1 back.
  • the stored program instructions relating to all functionalities of the mobile device, or a subset thereof, such as all communication functionalities, may at least partially be altered based on the disabling data, whereby all or a subset of the functionalities are disabled.
  • data such as program data, stored in the memory 130 and being related to the disabled functionality may be deleted, wherein the data may not be patched so as to enable the disabled functionality.
  • a functionality that probably not will be used by the unauthorized user may be disabled. For example, it may be more likely that a functionality that has not been used during a predetermined time interval will not be used in the near future. Then, such a functionality may be chosen to be disabled.
  • the functionality to be disabled may be chosen by the updating unit 120, or set by data received in an initiation message or the message comprising the disabling data.
  • the tracking functionality is initialized in response to use of another functionality, such as a communication functionality. Alternatively, the tracking functionality may be initialized once it is stored, or be run as a background functionality, which is not notified to the unauthorized user. This has the advantage that the mobile device 1 may be tracked without the knowledge of the unauthorized user.
  • the tracking functionality may comprise sending the geographical position of the mobile device 1 to the control center 20.
  • the processor 110 may request that the position determination unit 140 should determine the geographical position of the portable communication 1, which is transmitted by means of the transmitter/receiver unit 100, e.g. in an SMS (Short Message Service) message, to the control center or another remote device .
  • the address or number, to which the message with the geographical position should be sent, may be specified in a initiation message or the message comprising the disabling data.
  • the geographical position is periodically generated and transmitted.
  • the geographical position may e.g. be generated and transmitted once every 5 minutes.
  • the geographical position may e.g. be generated by means of a GPS (Global Positioning System) unit.
  • the geographical position is generated based on mobile assisted positioning, wherein any mobile centric positioning method, e.g. E-OTD (Enhanced Observed Time difference) or GPS, in which the mobile device 1 provides position measurements to the communication network 20 for computation of a location estimate by the communication network 10 or the control center 20.
  • the communication network 10 or the control center 20 may alternatively or additionally provide assistance data to the mobile device 1 to enable position measurements.
  • the tracking functionality comprises rendering a signal in response to a request from the service center 20, or from another authorized control device.
  • the signal may be of a certain type, such as an SMS, which is dedicated for stolen equipment.
  • the tracking functionality comprises enabling or switching on a camera, such as a photo or video camera of the mobile device 1. If a photo camera is switched on, photos may be generated and transmitted with predetermined intervals, such as every minute, every 5 minutes, etc. If a video camera is switched on, a streaming service may be initiated, wherein the recorded video is continuously transmitted to the control center 20 or another communication device. Additionally or alternatively, the tracking functionality may switch on the microphone of the mobile device 1, wherein audio data may be recorded and transmitted to the service center 20, e.g. by streaming or intermittently.
  • the message comprising disabling data is received according to a protocol for updating or upgrading program instructions, e.g. firmware, of the mobile device 1.
  • a protocol for updating or upgrading program instructions e.g. firmware
  • firmware e.g. firmware
  • OMA Open Mobile Alliance
  • SyncML Device Management Using this protocol has the advantage that no special implementation for disabling the functionality is needed except from the firmware upgrade functionality itself. Also, this protocol provides two-way communication and authentication. The firmware upgrade functionality is often added to a mobile device 1, wherein adding the disabling function does not incur any- additional cost.
  • the message sent from the control center 20 comprises authentication data, such as a public key, with which the data of the message is encrypted.
  • the public key of the control center 20 may be stored in the memory 130, e.g. when the mobile device 1 is manufactured.
  • the message may comprise an identification tag indicating that it is a message for disabling a functionality of the mobile device.
  • the mobile device 1 may verify that the message comprises disabling data.
  • the message comprises one or several certificates.
  • the mobile device 1 may verify that it is authorized to connect to a certain server, which is authorized to disable a certain functionality and/or that the message is received from a remote device that is authorized to disable at least one functionality.
  • the authentication data of the message is a code.
  • One or several codes for one or several control centers that are authorized to disable at least one functionality may be stored in the memory 130, e.g. during manufacturing or by remote updating of the memory 130.
  • the disabling data may be verified with one or several certificates, such as directly after downloading the updating data and/or prior to and in connection with using the updating data.
  • One or several initialization messages may be transmitted from the control center 20 to the mobile device 1 before the message comprising the disabling data is transmitted. Any of the initialization messages may comprise the authentication data rather than the message comprising the disabling data. Consequently, the authentication data and the disabling data need not be transmitted in the same message.
  • an acknowledge message for confirming disabling of the at least one functionality may be transmitted to a remote device, such as the control center 20, another mobile telephone, or a host computer of an e-mail box, in response to disabling at least one functionality.
  • the disabling data may comprise an identity tag, such as a name or number, e.g. IMEI (International Mobile Equipment Identifier) or IMSI (International Mobile Station Identity) of the mobile device 1 to disable, which may be written to and stored in memory 130.
  • identity tag such as a name or number, e.g. IMEI (International Mobile Equipment Identifier) or IMSI (International Mobile Station Identity) of the mobile device 1 to disable, which may be written to and stored in memory 130.
  • a computer may be connected to the input/output interface 150. Program instructions for the disabled functionality may be transferred from the computer to the memory 130. However, to prevent unauthorized enabling of the disabled functionality, the processor 110 may read the identity tag in response to the attempt to enable the functionality. The computer can prove that it is authorized e.g. if it has the identity tag, or an access code, associated with the disabling data. When the mobile device 1 has authorized the computer it can start updating the program instructions for the disabled functionality. The computer may e.g. be provided at a service point.
  • the disabled functionality may be restored by transmitting enabling data from the control center 20 to the mobile device 1. This may be done in the same manner as transmitting the disabling data as described above, albeit with enabling data rather than disabling data.
  • the enabling data comprises data for restoring the disabled functionality and may be accompanied by an identity tag, such as the IMEI or IMSI, wherein unauthorized enabling is prevented.
  • Fig. 3 illustrates certain components of the control center 20.
  • the control center may e.g. be provided by a server computer.
  • the control center 20 comprises a communication unit 160, a memory 170 and a controller 180.
  • the communication unit 160 comprises communication means for communication with the mobile device 1, such as a cable and/or a radio receiver/transmitter for establishing a connection to the communication network 10.
  • Memory 170 may comprise a RAM and/or a ROM memory.
  • the controller 180 may be a CPU and be configured to generate the message comprising the disabling data to be sent to the mobile device 1.
  • the disabling data may be generated based on device information received from the mobile device 1.
  • the disabling data may at least partly be stored in memory 170.
  • Fig. 4 illustrates one method according to the invention, which may be implemented using the OMA (Open Mobile Alliance) SyncML Device Management protocol.
  • Disabling of at least one functionality of the mobile device 1 may be initiated by reporting it as stolen to the control center 20. To prevent unauthorized reporting, the person reporting may be required to give a security code, such as a user name and/or password to the control center 20. The reporting may be done either via the global information network 30, via the PSTN 40, or via the communication network 10.
  • step 200 a push initiation message is transmitted from the control center 20 to the mobile device 1 to set up a connection between them.
  • step 201 the mobile device 1 receives the push initiation message.
  • step 202 the mobile device 1 authenticates the push initiation message to verify whether the control center 20 is authorized to disable any of its functionality. If the answer in step 202 is no, the procedure is ended, e.g. by not responding to the push initiation message. If the answer in step 201 is yes, the procedure proceeds to step 203, wherein device information is transmitted to the control center 20.
  • the device information may comprise information of the manufacturer of the mobile device, type, serial number, capabilities, and/or type or version of firmware etc. Together with the device information may also client credentials be transmitted.
  • the device information and the client credentials may be transmitted in a packet set up according to the SyncML DM protocol.
  • the device information may any information according to the SyncML DM specification.
  • the device information is received by the control center 20 in step 204, which in response thereto generates a message comprising data for disabling at least one functionality of the mobile device 1.
  • the disabling data may be generated in dependence of the device information received. For example, depending on the type or version of the firmware, the disabling message could specify that certain portions of program instructions of a particular firmware should be deleted, or replaced by only zeros or ones.
  • the message comprising the disabling data is transmitted to the mobile device 1.
  • the mobile device 1 receives the message comprising the disabling data.
  • the updating unit 120 alters at least a portion of program instructions for at least one functionality of the mobile device 1, such as described above, whereby said functionality is disabled.
  • the mobile device 1 When the functionality has been disabled, the mobile device 1 generates and transmits an acknowledge message to the control center 20 in step 208. However, if all communication functionalities of the mobile device 1 are disabled, no acknowledge message can be transmitted. The acknowledge message is received by the control center in step 209, wherein the procedure is ended.
  • the disabling data may be included in the push initiation message, wherein the device information need not be transmitted.
  • the message comprising the disabling data may comprise authentication data rather than the push initiation message.
  • the acknowledge message need not be transmitted in all embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne des procédés permettant de désactiver un dispositif mobile (1) ayant des capacités de communication. Un message comprenant des données de désactivation, qui désactive au moins une fonctionnalité du dispositif mobile (1), est transmis d'un centre de contrôle (2) au dispositif mobile (1). Les données de désactivation comprennent des données modifiant les instructions de programme pour au moins une fonctionnalité du dispositif mobile, désactivant ainsi ladite fonctionnalité. Un dispositif mobile (1) et un centre de contrôle (20) sont conçus pour mettre en oeuvre lesdits procédés.
PCT/EP2006/004428 2005-05-16 2006-05-11 Procede de desactivation d'un dispositif mobile WO2006122700A2 (fr)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CN2006800260498A CN101223799B (zh) 2005-05-16 2006-05-11 用于禁用移动设备的方法
US11/914,157 US20080293397A1 (en) 2005-05-16 2006-05-11 Method for Disabling a Mobile Device
MX2007014276A MX2007014276A (es) 2005-05-16 2006-05-11 Metodo para desactivar un dispositivo movil.
BRPI0610417-7A BRPI0610417A2 (pt) 2005-05-16 2006-05-11 método e dispositivo de controle para desabilitar pelo menos uma funcionalidade de um dispositivo móvel, e, dispositivo móvel
JP2008511593A JP4838303B2 (ja) 2005-05-16 2006-05-11 モバイルデバイスを無効化する方法

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
EP05104060.8 2005-05-16
EP05104060A EP1725056B1 (fr) 2005-05-16 2005-05-16 Procédé pour la désactivation d'un terminal mobile
US68574805P 2005-05-27 2005-05-27
US60/685,748 2005-05-27

Publications (2)

Publication Number Publication Date
WO2006122700A2 true WO2006122700A2 (fr) 2006-11-23
WO2006122700A3 WO2006122700A3 (fr) 2007-04-19

Family

ID=34978846

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2006/004428 WO2006122700A2 (fr) 2005-05-16 2006-05-11 Procede de desactivation d'un dispositif mobile

Country Status (8)

Country Link
US (1) US20080293397A1 (fr)
EP (1) EP1725056B1 (fr)
JP (1) JP4838303B2 (fr)
CN (1) CN101223799B (fr)
BR (1) BRPI0610417A2 (fr)
MX (1) MX2007014276A (fr)
RU (1) RU2418387C2 (fr)
WO (1) WO2006122700A2 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090106824A1 (en) * 2006-04-19 2009-04-23 Thierry Morel Method of Securing Access to a Proximity Communication Module in a Mobile Terminal
US20110247064A1 (en) * 2010-04-02 2011-10-06 Samsung Electronics Co., Ltd. Method and apparatus for protecting information in user terminal
US8811971B2 (en) 2007-08-01 2014-08-19 Nxp B.V. Mobile communication device and method for disabling applications
US9830567B2 (en) 2013-10-25 2017-11-28 Location Labs, Inc. Task management system and method

Families Citing this family (75)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1895745B1 (fr) * 2006-08-31 2015-04-22 Swisscom AG Procédé et système de communication pour enregistrer des données sur l'environnement
US8036707B2 (en) * 2006-09-14 2011-10-11 Samsung Electronics Co., Ltd Method and system for tracking mobile communication device using instant messaging
US20080090548A1 (en) * 2006-09-14 2008-04-17 Samsung Electronics Co., Ltd. Method for tracking mobile communication terminal
ATE509322T1 (de) 2006-12-14 2011-05-15 Research In Motion Ltd System und verfahren zum löschen und sperren eines entfernten geräts
US8856511B2 (en) 2006-12-14 2014-10-07 Blackberry Limited System and method for wiping and disabling a removed device
US8170530B2 (en) * 2007-04-11 2012-05-01 International Business Machines Corporation Managing wireless devices using access control
US8332402B2 (en) 2007-06-28 2012-12-11 Apple Inc. Location based media items
US9066199B2 (en) 2007-06-28 2015-06-23 Apple Inc. Location-aware mobile device
US8180379B2 (en) 2007-06-28 2012-05-15 Apple Inc. Synchronizing mobile and vehicle devices
US8311526B2 (en) 2007-06-28 2012-11-13 Apple Inc. Location-based categorical information services
US8385946B2 (en) 2007-06-28 2013-02-26 Apple Inc. Disfavored route progressions or locations
US8774825B2 (en) 2007-06-28 2014-07-08 Apple Inc. Integration of map services with user applications in a mobile device
US8108144B2 (en) 2007-06-28 2012-01-31 Apple Inc. Location based tracking
US8762056B2 (en) 2007-06-28 2014-06-24 Apple Inc. Route reference
US8204684B2 (en) 2007-06-28 2012-06-19 Apple Inc. Adaptive mobile device navigation
US8175802B2 (en) 2007-06-28 2012-05-08 Apple Inc. Adaptive route guidance based on preferences
US8290513B2 (en) 2007-06-28 2012-10-16 Apple Inc. Location-based services
US9109904B2 (en) 2007-06-28 2015-08-18 Apple Inc. Integration of map services and user applications in a mobile device
US8275352B2 (en) 2007-06-28 2012-09-25 Apple Inc. Location-based emergency information
US8977294B2 (en) * 2007-10-10 2015-03-10 Apple Inc. Securely locating a device
US8060748B2 (en) * 2007-12-21 2011-11-15 Telefonaktiebolaget Lm Ericsson (Publ) Secure end-of-life handling of electronic devices
US8355862B2 (en) 2008-01-06 2013-01-15 Apple Inc. Graphical user interface for presenting location information
US9250092B2 (en) 2008-05-12 2016-02-02 Apple Inc. Map service with network-based query for search
US8644843B2 (en) 2008-05-16 2014-02-04 Apple Inc. Location determination
US8359643B2 (en) 2008-09-18 2013-01-22 Apple Inc. Group formation using anonymous broadcast information
US8260320B2 (en) 2008-11-13 2012-09-04 Apple Inc. Location specific content
SG173004A1 (en) * 2008-12-12 2011-08-29 Nxp Bv Portable mobile communication device and method of controlling near field communication
JP5267211B2 (ja) * 2009-02-26 2013-08-21 富士通株式会社 無線端末装置
US8800061B2 (en) * 2009-03-06 2014-08-05 Absolute Software Corporation Automatic control of a security protection mode of an electronic device
US8429759B2 (en) * 2009-03-31 2013-04-23 Intel Corporation Theft management system and method
US8670748B2 (en) 2009-05-01 2014-03-11 Apple Inc. Remotely locating and commanding a mobile device
US8666367B2 (en) 2009-05-01 2014-03-04 Apple Inc. Remotely locating and commanding a mobile device
US8660530B2 (en) 2009-05-01 2014-02-25 Apple Inc. Remotely receiving and communicating commands to a mobile device for execution by the mobile device
US20110059731A1 (en) * 2009-09-04 2011-03-10 George Gregory Schivley Techniques for discouraging cell phone usage while driving a vehicle
US9288640B2 (en) * 2010-03-19 2016-03-15 Samsung Electronics Co., Ltd. Method and apparatus for transmitting and receiving message using customized tag
CN101835143A (zh) * 2010-05-05 2010-09-15 中兴通讯股份有限公司 移动终端定位系统和方法、移动终端
US8336664B2 (en) 2010-07-09 2012-12-25 Telecommunication Systems, Inc. Telematics basic mobile device safety interlock
JP5803112B2 (ja) * 2011-01-14 2015-11-04 ソニー株式会社 無線端末装置、情報処理装置、通信システムおよび無線端末装置の制御方法
US8700406B2 (en) * 2011-05-23 2014-04-15 Qualcomm Incorporated Preserving audio data collection privacy in mobile devices
US8621644B2 (en) 2011-12-29 2013-12-31 Elwha Llc System and method for protecting data stored on a removable data storage device
US8601597B2 (en) 2011-12-29 2013-12-03 Elwha Llc System and method for protecting data stored on a removable data storage device
US20130201356A1 (en) * 2012-02-07 2013-08-08 Arthrex Inc. Tablet controlled camera system
CN103530553A (zh) * 2013-10-22 2014-01-22 山东神思电子技术股份有限公司 一种具有授权卡的移动终端及授权方法
EP3100168B1 (fr) 2014-01-30 2022-01-19 Hewlett-Packard Development Company, L.P. Effacement de données d'un dispositif cible
US9213974B2 (en) 2014-02-07 2015-12-15 Bank Of America Corporation Remote revocation of application access based on non-co-location of a transaction vehicle and a mobile device
US9965606B2 (en) 2014-02-07 2018-05-08 Bank Of America Corporation Determining user authentication based on user/device interaction
US9208301B2 (en) 2014-02-07 2015-12-08 Bank Of America Corporation Determining user authentication requirements based on the current location of the user in comparison to the users's normal boundary of location
US20150227903A1 (en) * 2014-02-07 2015-08-13 Bank Of America Corporation Remote revocation of application access based on lost or misappropriated card
US9286450B2 (en) 2014-02-07 2016-03-15 Bank Of America Corporation Self-selected user access based on specific authentication types
US9331994B2 (en) 2014-02-07 2016-05-03 Bank Of America Corporation User authentication based on historical transaction data
US9317674B2 (en) 2014-02-07 2016-04-19 Bank Of America Corporation User authentication based on fob/indicia scan
US9390242B2 (en) 2014-02-07 2016-07-12 Bank Of America Corporation Determining user authentication requirements based on the current location of the user being within a predetermined area requiring altered authentication requirements
US9313190B2 (en) 2014-02-07 2016-04-12 Bank Of America Corporation Shutting down access to all user accounts
US9647999B2 (en) 2014-02-07 2017-05-09 Bank Of America Corporation Authentication level of function bucket based on circumstances
US9317673B2 (en) 2014-02-07 2016-04-19 Bank Of America Corporation Providing authentication using previously-validated authentication credentials
US9305149B2 (en) 2014-02-07 2016-04-05 Bank Of America Corporation Sorting mobile banking functions into authentication buckets
US9223951B2 (en) 2014-02-07 2015-12-29 Bank Of America Corporation User authentication based on other applications
US9424572B2 (en) 2014-03-04 2016-08-23 Bank Of America Corporation Online banking digital wallet management
US9600817B2 (en) 2014-03-04 2017-03-21 Bank Of America Corporation Foreign exchange token
US9600844B2 (en) 2014-03-04 2017-03-21 Bank Of America Corporation Foreign cross-issued token
US9830597B2 (en) 2014-03-04 2017-11-28 Bank Of America Corporation Formation and funding of a shared token
US9721248B2 (en) 2014-03-04 2017-08-01 Bank Of America Corporation ATM token cash withdrawal
US20150365293A1 (en) * 2014-06-13 2015-12-17 Uber Technologies, Inc. Enforcing policies based on information received from external systems
US9820148B2 (en) 2015-10-30 2017-11-14 Bank Of America Corporation Permanently affixed un-decryptable identifier associated with mobile device
US10021565B2 (en) 2015-10-30 2018-07-10 Bank Of America Corporation Integrated full and partial shutdown application programming interface
US9729536B2 (en) 2015-10-30 2017-08-08 Bank Of America Corporation Tiered identification federated authentication network system
US9641539B1 (en) 2015-10-30 2017-05-02 Bank Of America Corporation Passive based security escalation to shut off of application based on rules event triggering
US9923930B2 (en) 2015-11-19 2018-03-20 Bank Of America Corporation Selectively enabling and disabling biometric authentication based on mobile device state information
US10592700B2 (en) * 2016-01-11 2020-03-17 The Adt Security Corporation Securing electronic property from unauthorized use
US10460367B2 (en) 2016-04-29 2019-10-29 Bank Of America Corporation System for user authentication based on linking a randomly generated number to the user and a physical item
US10268635B2 (en) 2016-06-17 2019-04-23 Bank Of America Corporation System for data rotation through tokenization
US10511692B2 (en) 2017-06-22 2019-12-17 Bank Of America Corporation Data transmission to a networked resource based on contextual information
US10524165B2 (en) 2017-06-22 2019-12-31 Bank Of America Corporation Dynamic utilization of alternative resources based on token association
US10313480B2 (en) 2017-06-22 2019-06-04 Bank Of America Corporation Data transmission between networked resources
US10812537B1 (en) * 2018-07-23 2020-10-20 Amazon Technologies, Inc. Using network locality to automatically trigger arbitrary workflows

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0720400A2 (fr) * 1994-12-28 1996-07-03 Nec Corporation Fonction empèchant l'utilisation illicite du téléphone mobile, procédé et système correspondant
US20030065934A1 (en) * 2001-09-28 2003-04-03 Angelo Michael F. After the fact protection of data in remote personal and wireless devices

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3484162D1 (de) * 1983-08-18 1991-04-04 Nec Corp Funkkommunikationsgeraet abgeschaltet nach empfang einer bestimmten nachricht.
US6813498B1 (en) * 2000-10-27 2004-11-02 Lucent Technologies Inc. Apparatus, method and system for detection and recovery of missing wireless devices in communication systems
JP2003110482A (ja) * 2001-09-13 2003-04-11 Nokia Corp 情報配信システム
JP3823789B2 (ja) * 2001-09-18 2006-09-20 株式会社デンソー 移動通信端末装置、そのプログラムおよび位置検索サーバ
JP4173394B2 (ja) * 2003-03-25 2008-10-29 株式会社エヌ・ティ・ティ・ドコモ 中継サーバ装置
US20050186954A1 (en) * 2004-02-20 2005-08-25 Tom Kenney Systems and methods that provide user and/or network personal data disabling commands for mobile devices

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0720400A2 (fr) * 1994-12-28 1996-07-03 Nec Corporation Fonction empèchant l'utilisation illicite du téléphone mobile, procédé et système correspondant
US20030065934A1 (en) * 2001-09-28 2003-04-03 Angelo Michael F. After the fact protection of data in remote personal and wireless devices

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090106824A1 (en) * 2006-04-19 2009-04-23 Thierry Morel Method of Securing Access to a Proximity Communication Module in a Mobile Terminal
US8893234B2 (en) * 2006-04-19 2014-11-18 Orange Method of securing access to a proximity communication module in a mobile terminal
US8811971B2 (en) 2007-08-01 2014-08-19 Nxp B.V. Mobile communication device and method for disabling applications
US20110247064A1 (en) * 2010-04-02 2011-10-06 Samsung Electronics Co., Ltd. Method and apparatus for protecting information in user terminal
US9830567B2 (en) 2013-10-25 2017-11-28 Location Labs, Inc. Task management system and method
US10650333B2 (en) 2013-10-25 2020-05-12 Location Labs, Inc. Task management system and method

Also Published As

Publication number Publication date
JP2008541635A (ja) 2008-11-20
RU2418387C2 (ru) 2011-05-10
RU2007146775A (ru) 2009-06-27
EP1725056A1 (fr) 2006-11-22
MX2007014276A (es) 2008-02-07
WO2006122700A3 (fr) 2007-04-19
CN101223799A (zh) 2008-07-16
JP4838303B2 (ja) 2011-12-14
BRPI0610417A2 (pt) 2012-10-23
EP1725056B1 (fr) 2013-01-09
US20080293397A1 (en) 2008-11-27
CN101223799B (zh) 2012-08-15

Similar Documents

Publication Publication Date Title
EP1725056B1 (fr) Procédé pour la désactivation d'un terminal mobile
JP5422571B2 (ja) 無線機器の登録方法及び装置
US10595352B2 (en) Establishing a secure short-range wireless communications connection at a vehicle
US8554176B2 (en) Method and apparatus for creating a remotely activated secure backup service for mobile handsets
US9112905B2 (en) Authentication of access terminal identities in roaming networks
US20090253409A1 (en) Method of Authenticating Home Operator for Over-the-Air Provisioning of a Wireless Device
EP3466021B1 (fr) Procédé de gestion de l'état d'un dispositif connecté
JP4824746B2 (ja) 認証情報の作成方法
US20150264017A1 (en) Secure vehicle data communications
JP2008546253A (ja) 機密保護方法及び情報サービス提供方法
JP2006319811A (ja) データバックアップシステム
CN101155212A (zh) 一种限制移动终端使用的方法
WO2021000319A1 (fr) Procédé, appareil et système de garantie de la sécurité d'un terminal
Sehwani et al. Real time automobile tracking system with an automated security algorithm
CN101163289A (zh) 一种限制移动终端使用区域的方法
EP3984262B1 (fr) Provisionnement d'identité de niveau d'application
WO2021238989A1 (fr) Procédé par radio et dispositif associé
CN117896104A (zh) 跨网络车载设备控制方法、装置、系统、设备及存储介质
CN113767605A (zh) 一种负载认证方法及系统、可移动平台、负载、转接装置
CN111770469A (zh) 车辆控制方法、装置、车辆及计算机可读存储介质
CN101163327A (zh) 一种通过网络信息限制移动终端使用区域的方法

Legal Events

Date Code Title Description
DPE1 Request for preliminary examination filed after expiration of 19th month from priority date (pct application filed from 20040101)
WWE Wipo information: entry into national phase

Ref document number: 2008511593

Country of ref document: JP

WWE Wipo information: entry into national phase

Ref document number: MX/a/2007/014276

Country of ref document: MX

NENP Non-entry into the national phase

Ref country code: DE

WWW Wipo information: withdrawn in national office

Ref document number: DE

WWE Wipo information: entry into national phase

Ref document number: 8859/DELNP/2007

Country of ref document: IN

WWE Wipo information: entry into national phase

Ref document number: 2007146775

Country of ref document: RU

WWE Wipo information: entry into national phase

Ref document number: 200680026049.8

Country of ref document: CN

WWE Wipo information: entry into national phase

Ref document number: 11914157

Country of ref document: US

122 Ep: pct application non-entry in european phase

Ref document number: 06742876

Country of ref document: EP

Kind code of ref document: A2

ENP Entry into the national phase

Ref document number: PI0610417

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20071114